CSCI-ISCW

THE 2017 INTERNATIONAL SYMPOSIUM ON CYBER WARFARE, CYBER DEFENSE, AND SECURITY

Publications

All accepted papers of all symposiums will be published by Conference Publishing Services, CPS:https://www.computer.org/web/cs-cps/ as part of the proceedings of The 2017 International Conference on Computational Science and Computational Intelligence (CSCI'17).

Past year's CSCI proceedings are indexed into IEEE Xplore Digital Library and can be accessed via:

Topics of interest include, but are not limited to the following

Prologue: Cyber Warfare adds an additional dimension to warfare. Generally, it involves the battlespace use and targeting of computers and networks in warfare. Cyber Warfare strategies include both offensive and defensive operations pertaining to the threat of cyberattacks, espionage, sabotage, disruptions to infrastructures, theft of critical information, and publishing deliberate misinformation (fake news and fabricated news) spread via traditional media and online social media with the intend to mislead in order to disrupt the political processes of nations. The methods and technologies utilized in Cyber Warfare can be countered using Cyber Defense strategies. Cyber Defense strategies involve the heavy and targeted use of Cyber Security. Topics of interest include:

- Cyber Warfare Technologies and Strategies

- Cyber Defense Technologies and Strategies

- Authorization Infrastructures

- Autonomous Security Methods

- Novel Biometric Methods

- Cloud Security

- Forensic Technologies

- Cryptography and Formal Methods

- Trapping Technologies

- Data Protection Methods

- Security and Reverse Engineering

- Vulnerability Analysis

- Steganography and Steganalysis

- Identity Management

- Security Policies

- Legislation and Regulatory Approaches for Enhancing Security

- Safe Computing

- Identification and Prevention of Online Scams

- Mobile Protection Techniques

- Security Risk Analysis, Management and Trade-offs

- Identity, Privacy and Trust Management

- Security by Design

- Incident Response Methods

- Cybercrime and Underground Economy - Identification and Prevention

- Detection of Malicious Software

- Novel Security Tools

- Lifecycle Security Management and Identification of the Weakest Links